[Contents]
[Prev]
[Next]
[Index]
[Report an Error]
Types of Firewall User Authentication
JUNOS software supports the following
two types of firewall user authentication:
- Pass-Through Authentication—A host or a user from
one zone tries to access resources on another zone. You must use an
FTP, Telnet, or HTTP client to access the IP address of the protected
resource and to get authenticated by the firewall. The device uses
FTP, Telnet, or HTTP to collect username and password information,
and subsequent traffic from the user or host is allowed or denied
based on the result of this authentication.
- Web Authentication—Users try to connect, using HTTP,
to an IP address on the device that is enabled for Web authentication;
in this scenario, you do not use HTTP to get to the IP address of
the protected resource. You are prompted for the username and password
that are verified by the device. Subsequent traffic from the user
or host to the protected resource is allowed or denied based on the
result of this authentication.
[Contents]
[Prev]
[Next]
[Index]
[Report an Error]